General
-
Target
57ae9acddea94e91438697ff1c595845
-
Size
673KB
-
Sample
240113-cctg2shhfj
-
MD5
57ae9acddea94e91438697ff1c595845
-
SHA1
2b8b0399de86cd0751a836621afe4b9c4d84f0e3
-
SHA256
5a2a0fcd0f1f6570a1a33be44d1291cda800b5ba8278b2d1d08cda35cacb8210
-
SHA512
c1fbae0cc41dad3f7dd6f000fcb05f0f0470fa57eb87a6f913be2b94ee003f0e0df55bac69c45a68e5628fb19b4249a9a69d77624d9e8b85c64cdad3528f06f9
-
SSDEEP
12288:2X9HWZs4IafPn9JsnYZqfSYeqj2fsLHzp9rsOHoPYsVDR+EfOpItajbw4v/lAlTy:s9HWfPjsnYZqfSqioHzp9rsOHZsZHUfv
Static task
static1
Behavioral task
behavioral1
Sample
57ae9acddea94e91438697ff1c595845.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
57ae9acddea94e91438697ff1c595845.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
bojtai.club - Port:
587 - Username:
[email protected] - Password:
hcx8knJINooP
Targets
-
-
Target
57ae9acddea94e91438697ff1c595845
-
Size
673KB
-
MD5
57ae9acddea94e91438697ff1c595845
-
SHA1
2b8b0399de86cd0751a836621afe4b9c4d84f0e3
-
SHA256
5a2a0fcd0f1f6570a1a33be44d1291cda800b5ba8278b2d1d08cda35cacb8210
-
SHA512
c1fbae0cc41dad3f7dd6f000fcb05f0f0470fa57eb87a6f913be2b94ee003f0e0df55bac69c45a68e5628fb19b4249a9a69d77624d9e8b85c64cdad3528f06f9
-
SSDEEP
12288:2X9HWZs4IafPn9JsnYZqfSYeqj2fsLHzp9rsOHoPYsVDR+EfOpItajbw4v/lAlTy:s9HWfPjsnYZqfSqioHzp9rsOHZsZHUfv
Score10/10-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-